Masking the energy behaviour of encryption algorithms

H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. Brooks

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Smart cards are vulnerable to both invasive and noninvasive attacks. Specifically, noninvasive attacks using power and timing measurements to extract the cryptographic key have drawn a lot of negative publicity for smart card usage. The power measurement techniques rely on the data-dependent energy behaviour of the underlying system. Further, power analysis can be used to identify the specific portions of the program being executed to induce timing glitches that may in turn help to bypass key checking. Thus, it is important to mask the energy consumption when executing the encryption algorithms. The instruction set architecture of a simple five-stage pipelined smart card processor with secure instructions to mask the energy differences due to key-related data-dependent computations in DES and Rijndael encryptions is augmented. The secure versions operate on the normal and complementary versions of the operands simultaneously to mask the energy variations due to value-dependent operations. However, this incurs the penalty of increased overall energy consumption in the data-path components. Consequently, we employ secure versions of instructions only for critical operations; that is we use secure instructions selectively, as directed by an optimising compiler. Using a cycle-accurate energy simulator, the effectiveness of this enhancement is demonstrated. The approach achieves energy masking of critical operations, consuming 83% less energy compared to existing approaches employing dual rail circuits.

Original languageEnglish (US)
Pages (from-to)274-284
Number of pages11
JournalIEE Proceedings: Computers and Digital Techniques
Volume150
Issue number5 SPEC. ISS.
DOIs
StatePublished - Sep 1 2003

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Hardware and Architecture
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Masking the energy behaviour of encryption algorithms'. Together they form a unique fingerprint.

Cite this